Show filters
2,155 Total Results
Displaying 231-240 of 2,155
Sort by:
Attacker Value
Unknown

CVE-2019-15790

Disclosure Date: October 30, 2019 (last updated February 21, 2025)
Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged running process by exploiting PID recycling. This information could then be used to obtain ASLR offsets for a process with an existing memory corruption vulnerability. The initial fix introduced regressions in the Python Apport library due to a missing argument in Report.add_proc_environ in apport/report.py. It also caused an autopkgtest failure when reading /proc/pid and with Python 2 compatibility by reading /proc maps. The initial and subsequent regression fixes are in 2.20.11-0ubuntu16, 2.20.11-0ubuntu8.6, 2.20.9-0ubuntu7.12, 2.20.1-0ubuntu2.22 and 2.14.1-0ubuntu3.29+esm3.
Attacker Value
Unknown

CVE-2019-15681

Disclosure Date: October 29, 2019 (last updated November 27, 2024)
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
Attacker Value
Unknown

CVE-2019-11483

Disclosure Date: October 29, 2019 (last updated November 27, 2024)
Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.
Attacker Value
Unknown

CVE-2019-11481

Disclosure Date: October 29, 2019 (last updated February 21, 2025)
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
Attacker Value
Unknown

CVE-2019-11482

Disclosure Date: October 29, 2019 (last updated February 21, 2025)
Sander Bos discovered a time of check to time of use (TOCTTOU) vulnerability in apport that allowed a user to cause core files to be written in arbitrary directories.
Attacker Value
Unknown

CVE-2019-11485

Disclosure Date: October 29, 2019 (last updated February 21, 2025)
Sander Bos discovered Apport's lock file was in a world-writable directory which allowed all users to prevent crash handling.
Attacker Value
Unknown

CVE-2019-18408

Disclosure Date: October 24, 2019 (last updated November 08, 2023)
archive_read_format_rar_read_data in archive_read_support_format_rar.c in libarchive before 3.4.0 has a use-after-free in a certain ARCHIVE_FAILED situation, related to Ppmd7_DecodeSymbol.
Attacker Value
Unknown

CVE-2019-18218

Disclosure Date: October 21, 2019 (last updated November 08, 2023)
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
Attacker Value
Unknown

CVE-2019-18197

Disclosure Date: October 18, 2019 (last updated November 27, 2024)
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
Attacker Value
Unknown

CVE-2019-17666

Disclosure Date: October 17, 2019 (last updated November 08, 2023)
rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.